Sciweavers

23 search results - page 4 / 5
» Controlling factors in evaluating path-sensitive error detec...
Sort
View
GLOBECOM
2009
IEEE
14 years 2 months ago
The Directional Attack on Wireless Localization -or- How to Spoof Your Location with a Tin Can
—802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show ...
Kevin S. Bauer, Damon McCoy, Eric W. Anderson, Mar...
ACHI
2008
IEEE
14 years 2 months ago
NALP: Navigating Assistant for Large Display Presentation Using Laser Pointer
In this paper, we present NALP (Navigating Assistant using Laser Pointer), a novel interaction technique for large display presentation control. NALP is based on laser dot detecti...
Liang Zhang, Yuanchun Shi, Boliang Chen
IPPS
2008
IEEE
14 years 2 months ago
Software monitoring with bounded overhead
In this paper, we introduce the new technique of HighConfidence Software Monitoring (HCSM), which allows one to perform software monitoring with bounded overhead and concomitantl...
Sean Callanan, David J. Dean, Michael Gorbovitski,...
MM
2006
ACM
103views Multimedia» more  MM 2006»
14 years 1 months ago
Progressive cut
Recently, interactive image cutout technique becomes prevalent for image segmentation problem due to its easy-to-use nature. However, most existing stroke-based interactive object...
Chao Wang, Qiong Yang, Mo Chen, Xiaoou Tang, Zhong...
CHI
2004
ACM
14 years 8 months ago
Automatic support for web user studies with SCONE and TEA
This paper describes the concepts of TEA, a flexible tool that supports user tests by automating repetitive tasks and collecting data of user inputs and actions. TEA was specifica...
Hartmut Obendorf, Harald Weinreich, Torsten Hass